Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in ...Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.展开更多
Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency ar...Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs.展开更多
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att...Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model.展开更多
基于光闸的单向传输系统是主要承担不同密级系统的数据传输工作。与传统基于网闸非等密级系统数据传输不同:基于光闸的单向传输系统安全性由光单向传输特性保证;由于数据的单向传输,无法通过反馈确定机制保证数据传输的可靠性。为此提...基于光闸的单向传输系统是主要承担不同密级系统的数据传输工作。与传统基于网闸非等密级系统数据传输不同:基于光闸的单向传输系统安全性由光单向传输特性保证;由于数据的单向传输,无法通过反馈确定机制保证数据传输的可靠性。为此提出了一种高可靠的无连接网络层输出协议——光闸数据包协议(Optical Shutter Data Protocol,OSDP),该协议采用CRC检验以提高校验错能力,协议可选项——报文摘要,用于纠错功能,在双机冗余备份系统情况下,可大幅提高数据传输的可靠性。以峰值流量800Mb/s估算,该系统理论上平均无故障时间为111.57天,试验表明该协议在基于无反馈的光闸单向传输系统中能有效保证数据传输的可靠性。展开更多
基金Supported by the National Natural Science Foun-dation of China(60473072)
文摘Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.
文摘Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs.
文摘Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model.
文摘基于光闸的单向传输系统是主要承担不同密级系统的数据传输工作。与传统基于网闸非等密级系统数据传输不同:基于光闸的单向传输系统安全性由光单向传输特性保证;由于数据的单向传输,无法通过反馈确定机制保证数据传输的可靠性。为此提出了一种高可靠的无连接网络层输出协议——光闸数据包协议(Optical Shutter Data Protocol,OSDP),该协议采用CRC检验以提高校验错能力,协议可选项——报文摘要,用于纠错功能,在双机冗余备份系统情况下,可大幅提高数据传输的可靠性。以峰值流量800Mb/s估算,该系统理论上平均无故障时间为111.57天,试验表明该协议在基于无反馈的光闸单向传输系统中能有效保证数据传输的可靠性。